Connect with us

Hi, what are you looking for?



Adobe Patches Flash Player Zero-Day Used in Watering-hole Attacks

Adobe has released security updates for its Adobe Flash Player to address vulnerabilities that are being exploited in the wild.

Adobe has released security updates for its Adobe Flash Player to address vulnerabilities that are being exploited in the wild.

According to Kaspersky Lab, who discovered the zero-day (CVE-2014-0515) earlier this month, there are at least two different exploits currently being used in active attacks.

Both exploits spread from a site created by the Syrian Ministry of Justice to serve as an online forum for citizens to complain about law and order violations. As such, Kaspersky Lab believes the attack is a watering-hole attack designed to target Syrian dissidents complaining about the government.

“The first exploit (movie.swf) is standard and can infect practically any unprotected computer, the second exploit (include.swf) only functions properly on computers where Adobe Flash Player 10 ActiveX and Cisco MeetingPlace Express Add-In are installed,” Vyacheslav Zakorzhevsky, a Kaspersky Lab Expert, explained.

The vulnerability is located in the Flash Player Pixel Bender component, designed for video and image processing, but is no longer supported by Adobe.

Versions of Adobe Flash Player affected by the vulnerability include:

• Adobe Flash Player and earlier versions for Windows

Advertisement. Scroll to continue reading.

• Adobe Flash Player and earlier versions for Macintosh

• Adobe Flash Player and earlier versions for Linux 

“We are sure that all these tricks were used in order to carry out malicious activity against a very specific group of users without attracting the attention of security solutions,” Zakorzhevsky said. We believe that the Cisco add-in may be used to download/implement the payload as well as to spy directly on the infected computer. It’s likely that the attack was carefully planned and that professionals of a pretty high caliber were behind it. The use of a professionally written 0-day exploits that were used to infect a single resource testifies to this.”

“Although we’ve only seen a limited number attempts to exploit this vulnerability, we’re strongly recommending users to update their versions of Adobe Flash Player software,” Zakorzhevsky continued. “It is possible that once information about this vulnerability becomes known, criminals would try to reproduce these new exploits or somehow get the existing variants and use it in other attacks. Even with a patch available, cybercriminals would expect to profit from this vulnerability because a worldwide update of software as widely used as Flash Player will take some time. Unfortunately this vulnerability will be dangerous for a while.”

“The authors were counting on the developers not finding a vulnerability in that component and that the exploit would remain active for longer,” Zakorzhevsky noted in a blog post. “All this suggests that the attackers were not targeting users en masse.”

Adobe credited Alexander Polyakov of Kaspersky Lab for reporting the vulnerability.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.